Description

Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets, and discover where your organization is most vulnerable to hacking in this network security training course.

Course Objectives

• understanding how perimeter defenses work and then be lead into scanning and attacking their own networks • learn how Intruders escalate privileges and what steps can be taken to secure a system • understanding and experience in Ethical Hacking • Learning about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Who Should Attend?

• IT Security • IT Security Auditing • Technical IT Management • Those with the involvement of systems integration and corporate IT development. Financial controllers with a technical interest may also benefit from the training course.